Informatics and mathematical methods in simulation最新文献

筛选
英文 中文
Information technologies for decision-making in formation uniform database of analogue objects of the researched object 信息决策技术在研究对象模拟对象信息统一数据库中的应用
Informatics and mathematical methods in simulation Pub Date : 2022-09-29 DOI: 10.15276/imms.v12.no3.182
N. M. Yershova
{"title":"Information technologies for decision-making in formation uniform database of analogue objects of the researched object","authors":"N. M. Yershova","doi":"10.15276/imms.v12.no3.182","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.182","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129602073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of the pseudorandom key sequences generation algorithm based on cellular automaton and many-valued logic bent-sequences 基于元胞自动机和多值逻辑弯曲序列的伪随机密钥序列生成算法的改进
Informatics and mathematical methods in simulation Pub Date : 2022-09-29 DOI: 10.15276/imms.v12.no3.137
M.V. Khymenko, A. Sokolov
{"title":"Improvement of the pseudorandom key sequences generation algorithm based on cellular automaton and many-valued logic bent-sequences","authors":"M.V. Khymenko, A. Sokolov","doi":"10.15276/imms.v12.no3.137","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.137","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129449021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent system for assessing and forecasting the risk of failure of components of a complex technical system 用于评估和预测复杂技术系统部件失效风险的智能系统
Informatics and mathematical methods in simulation Pub Date : 2022-09-29 DOI: 10.15276/imms.v12.no3.154
A.V. Vychuzhanin
{"title":"Intelligent system for assessing and forecasting the risk of failure of components of a complex technical system","authors":"A.V. Vychuzhanin","doi":"10.15276/imms.v12.no3.154","DOIUrl":"https://doi.org/10.15276/imms.v12.no3.154","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Steganoanalytical algorithm based on the study of the singular decomposition of digital image matrix blocks 基于隐写分析算法的数字图像矩阵块奇异分解研究
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.104
K. Tryfonova, S. Sokalsky
{"title":"Steganoanalytical algorithm based on the study of the singular decomposition of digital image matrix blocks","authors":"K. Tryfonova, S. Sokalsky","doi":"10.15276/imms.v12.no1-2.104","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.104","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a minimal complexity suboptimal control system for the vacuum distillation column of an alcohol production plant 某酒精生产装置真空精馏塔最小复杂度次优控制系统设计
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.84
A. Stopakevych, O. Stopakevych
{"title":"Design of a minimal complexity suboptimal control system for the vacuum distillation column of an alcohol production plant","authors":"A. Stopakevych, O. Stopakevych","doi":"10.15276/imms.v12.no1-2.84","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.84","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the states of functioning of the state cybernetic protection system 状态控制论保护系统功能状态的评估
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.114
V. Khoroshko, Yulia Khokhlachova
{"title":"Assessment of the states of functioning of the state cybernetic protection system","authors":"V. Khoroshko, Yulia Khokhlachova","doi":"10.15276/imms.v12.no1-2.114","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.114","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131217614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information system for enterprises cyber security normative support 为企业信息系统网络安全提供规范支撑
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.23
V.P. Halytsky, O. Stopakevych
{"title":"Information system for enterprises cyber security normative support","authors":"V.P. Halytsky, O. Stopakevych","doi":"10.15276/imms.v12.no1-2.23","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.23","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126154337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of configurating secure connection to corporate networks 自动配置与公司网络的安全连接
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.73
P. Patalashko, N. Kushnirenko
{"title":"Automation of configurating secure connection to corporate networks","authors":"P. Patalashko, N. Kushnirenko","doi":"10.15276/imms.v12.no1-2.73","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.73","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134270864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital image falsification done by method of adobe photoshop patch 数字图像伪造完成的方法adobephotoshoppatch
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.40
M.V. Gontar, V. Zorilo, O. Lebedeva
{"title":"Digital image falsification done by method of adobe photoshop patch","authors":"M.V. Gontar, V. Zorilo, O. Lebedeva","doi":"10.15276/imms.v12.no1-2.40","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.40","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The steganographic method with multiple access based on frequency-spatial matrices 基于频率空间矩阵的多址隐写方法
Informatics and mathematical methods in simulation Pub Date : 2022-06-28 DOI: 10.15276/imms.v12.no1-2.5
A. Sokolov
{"title":"The steganographic method with multiple access based on frequency-spatial matrices","authors":"A. Sokolov","doi":"10.15276/imms.v12.no1-2.5","DOIUrl":"https://doi.org/10.15276/imms.v12.no1-2.5","url":null,"abstract":"","PeriodicalId":370732,"journal":{"name":"Informatics and mathematical methods in simulation","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121816411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信